Introduction

This article discusses the security of Firebird database files and
in particular access to the metadata stored in those files. It has been
written in response to frequent questions on the Firebird lists concerning
these issues. The article avoids technical specifics. To discover how to
secure files in your particular operating system refer to relevant
documentation for that operating system, to discover how to apply user and
object security in Firebird databases refer to documentation available
from the Firebird website (noted above) or buy The Firebird
Book by Helen Borrie.